Cryptcat: Netcat Using Two-Fish Encryption, HakTip 88

preview_player
Показать описание
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
This week on HakTip Shannon is trying out Cryptcat, Netcat with Encryption!

Cryptcat is another command line tool that is built on top of Netcat and works almost exactly the same. We've discussed the fact that Netcat usage is transmitted in plain text, meaning there is no encryption and anyone can see what you are doing across computers. Cryptcat gives you a version of Netcat using two-fish encryption. I was able to download it on my Linux Mint machine by simply typing into the terminal: sudo apt-get install cryptcat. Now type Cryptcat -h. You'll notice that a lot of the options for Cryptcat are the same as Netcat. It also uses the same commands.
Here's an example for you:
On my computer - I type "cryptcat -k mypassword 10.73.31.124 1337". Cryptcat opens cryptcat. -k does enables the password or the symmetric key (which means both of us need to know that key). The next word if my password, then the ip address of the other computer. The last bit is my port.
On Darren's computer, he will type "cryptcat -k mypassword -l -p 1337". Cryptcat again, opens cryptcat. -k does enabled the password. Again, Darren puts in our shared password, then -l listens. -p 1337 means listen on port 1337.
You'll notice a bunch of packets get transmitted between us, but all of them are encrypted.
Now, if we chat via Netcat. I'll be the listener this time. Open with "nc -l -p 1337" and Darren uses "nc 10.73.31.107 1337". that's me!
Now, lets go back to Wireshark and watch the packets roll in as we chat. You'll notice that these chats ARE NOT encrypted.
And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.

-~-~~-~~~-~~-~-
Please watch: "Bash Bunny Primer - Hak5 2225"
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Рекомендации по теме
Комментарии
Автор

Thank you for the video. It is very helpful. You basically, explain netcat, cryptcat with practical wireshark demonstration. Good work. Please, carry on.

merajkhalidkhan
Автор

you rock babe. best tut ever ive seen, content wise and presentation wise

christymathew
Автор

thank you very much for your wonderful lecture!!!

enfn
Автор

can we use cryptat to set persistence after post exploitation?

themathsacademy
Автор

will this work between Windows computers? Just curious

gnarlyhacks
Автор

hey shannon, happy San valentine day <3

abhiee
Автор

how can i decrypt it from a captured packet if I know the password?

wobble_cat
Автор

can we use cryptcat on windows and if yes then how???

sakshammr.cheema
Автор

Specifying passwords on the commandline is not a good idea, since the password can then be seen using "ps -aux" or in the bash history.

MichaelSafyan
Автор

sis tell me how to crack a software that requires key ... this key is onliine (a set number of keys) ... we must enter the key, which they give, to open the software to use it .. (.net is used) .. now add a video on it let me see

DarkKnight-jtho
Автор

Really, her name is Shannon and she is into cryptography? That can't be a coincidence...

paulfrischknecht
join shbcf.ru